API Reference
ApplicabilityTraceRow
Ordered applicability trace row (friendly for RSOP/gpresult views).
Inheritance
- Object
- ApplicabilityTraceRow
Constructors
public ApplicabilityTraceRow() #Inherited Methods
Properties
public Int32 Order { get; set; } #1-based order of the GPO in the evaluated list.
public Guid Id { get; set; } #GPO identifier (GUID).
public String GpoName { get; set; } #Friendly display name of the GPO.
public String GpoDistinguishedName { get; set; } #Distinguished Name (CN={GUID},CN=Policies,...) of the GPO when available.
public Nullable<Boolean> HasWmiFilter { get; set; } #True when a WMI filter is linked; false when not; null when not evaluated.
public Nullable<Boolean> WmiMatched { get; set; } #True when the WMI filter evaluated to true; false when evaluated to false; null when not evaluated or no filter.
public Nullable<Boolean> WmiAccessDenied { get; set; } #True when reading WMI filter attributes was access denied; null when not evaluated.
public String WmiFilterDistinguishedName { get; set; } #DN of the linked WMI filter (when readable).
public String WmiFilterName { get; set; } #Display name of the linked WMI filter (when readable).
public Nullable<Int32> WmiQueryCount { get; set; } #Number of WMI queries present in the filter (when readable).
public Nullable<Boolean> SecurityAllowed { get; set; } #True when security filtering allows application; false when denied; null when not evaluated.
public Boolean Included { get; set; } #True when the GPO is included after gating (inheritance/enforced/scope + applicability).
public String Path { get; set; } #Optional path indicator for pair scenarios: "Computer" or "User". Populated by callers that emit consolidated traces for both paths.
public String WmiEvaluation { get; set; } #How the WMI filter was evaluated: "Runtime" when executed via WMI provider, "Heuristic" when parsed locally, "Denied" when access denied prevented evaluation, or null when not evaluated or no filter.
public String SecurityReason { get; set; } #Optional reason string for the security decision (matched ACEs or denies).
public IReadOnlyList<String> SecurityAllowSources { get; set; } #Allow sources that granted Apply GP (friendly list).
public IReadOnlyList<String> SecurityDenySources { get; set; } #Deny sources that prevented Apply GP (friendly list).
public String ContainerScope { get; set; } #Origin scope of the link that contributed this GPO to the plan: "Site", "Domain", or "OU". When sites are not included, most rows originate from "Domain" or "OU".